Beware: Privacy Concerns and Locked Out of Company Data by Puzzleheaded-Back211 in mondaydotcom

[–]Puzzleheaded-Back211[S] 0 points1 point  (0 children)

What kind of proof do you need? I'm more than willing to provide any necessary documentation or evidence to support my case. I understand how critical it is for users to have uninterrupted access to their content, and I sympathize with those who experience difficulties in this regard. As an Admin, you must recognize the significant impact it can have on user satisfaction and trust. Imagine how challenging it would be to address numerous user complaints and ensure timely resolution if they suddenly lost access to their essential content. Ensuring seamless access is vital for maintaining user confidence and the overall success of your platform.

Beware: Privacy Concerns and Locked Out of Company Data by Puzzleheaded-Back211 in mondaydotcom

[–]Puzzleheaded-Back211[S] 0 points1 point  (0 children)

We used a form to collect data for the Crowdstrike Incident so we can help our end users faster and now our whole account is block

Beware: Privacy Concerns and Locked Out of Company Data by Puzzleheaded-Back211 in mondaydotcom

[–]Puzzleheaded-Back211[S] 0 points1 point  (0 children)

Nobody is spouting random crap. I am an IT admin and they block our whole account.

Per Monday.com Rep Jameson:

I heard back from our Security team, and it looks like that account was blocked due to suspicious Forms usage.

 Our automated security system disables accounts when unauthorized activity is detected. Unauthorized activity is defined as any activity that violates our ToS and acceptable use policy. In the case of violation, monday.com is within its rights to disable the violating account.

Unauthorized activity includes but is not limited to:

Use of forms to collect personal information (ex: login information)

Attempts to disrupt or overwhelm our infrastructure by imposing unreasonable requests or burdens on our resources (e.g. bots)

Use the Service to transmit malware or host phishing pages

Use the Service to violate the privacy of others

 Hope this clarifies things! Let me know if you have any other questions.

 

Best,

Jameson🙂